CVE-2015-4103
Published: 3 June 2015
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Released
(2.0.0+dfsg-2ubuntu1.13)
|
|
upstream |
Needed
|
|
utopic |
Released
(2.1+dfsg-4ubuntu6.7)
|
|
vivid |
Released
(1:2.2+dfsg-5expubuntu9.2)
|
|
Patches: upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=5c83b2f5b4b956e91dd6e5711f14df7ab800aefb |
||
qemu-kvm Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
xen Launchpad, Ubuntu, Debian |
precise |
Released
(4.1.6.1-0ubuntu0.12.04.6)
|
trusty |
Released
(4.4.2-0ubuntu0.14.04.2)
|
|
upstream |
Needed
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Not vulnerable
(code not present)
|
|
Patches: upstream: http://xenbits.xen.org/xsa/xsa128-qemut.patch upstream: http://xenbits.xen.org/xsa/xsa128-qemuu-4.3.patch upstream: http://xenbits.xen.org/xsa/xsa128-qemuu.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |